標(biāo)題: Titlebook: Applied Computing, Computer Science, and Advanced Communication; First International Luo Qi Conference proceedings 2009 Springer-Verlag Be [打印本頁] 作者: osteomalacia 時(shí)間: 2025-3-21 19:37
書目名稱Applied Computing, Computer Science, and Advanced Communication影響因子(影響力)
書目名稱Applied Computing, Computer Science, and Advanced Communication影響因子(影響力)學(xué)科排名
書目名稱Applied Computing, Computer Science, and Advanced Communication網(wǎng)絡(luò)公開度
書目名稱Applied Computing, Computer Science, and Advanced Communication網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applied Computing, Computer Science, and Advanced Communication被引頻次
書目名稱Applied Computing, Computer Science, and Advanced Communication被引頻次學(xué)科排名
書目名稱Applied Computing, Computer Science, and Advanced Communication年度引用
書目名稱Applied Computing, Computer Science, and Advanced Communication年度引用學(xué)科排名
書目名稱Applied Computing, Computer Science, and Advanced Communication讀者反饋
書目名稱Applied Computing, Computer Science, and Advanced Communication讀者反饋學(xué)科排名
作者: 不要不誠實(shí) 時(shí)間: 2025-3-21 20:45
Retracted: New Interleaving and Forward Error Correction Strategies for Streaming,ituation of networks. Considering time constraints in multimedia streaming, we change the number of redundant FEC packets according to the condition of network, so that the experienced frame loss rate does not vary greatly under different packet loss rates. We present the results of simulation using NS2 simulator.作者: 泛濫 時(shí)間: 2025-3-22 01:20 作者: 萬花筒 時(shí)間: 2025-3-22 05:27 作者: Spinal-Fusion 時(shí)間: 2025-3-22 12:15
Mathematics Used for Expressing Waves,ested via simulation. The simulation results showed that Bloom filter is useful for space savings and it is easy to implement. The results also showed that the optimal number of hash function minimizes the false prediction.作者: DALLY 時(shí)間: 2025-3-22 15:13 作者: 沒花的是打擾 時(shí)間: 2025-3-22 18:34
Engineering Optimization in Design Processesodifies and extends A, B’s content. ISO l8000-6C greatly improves the key technologies such as the physical data encoding, modulating type, anti-collision arithmetic and so on. This paper realizes data encode based on the ISO18000-6C standard and validates with FPGA.作者: slipped-disk 時(shí)間: 2025-3-22 23:57 作者: 拋棄的貨物 時(shí)間: 2025-3-23 04:41 作者: 受辱 時(shí)間: 2025-3-23 08:00
Conference proceedings 2009nference: agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high-performance networks and protocols, multimedia and web services, network reliability and QoS, neural networks and 作者: anaerobic 時(shí)間: 2025-3-23 13:19 作者: Left-Atrium 時(shí)間: 2025-3-23 15:31
Emergency Command System Based on Satellite Link,patching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.作者: 600 時(shí)間: 2025-3-23 18:30
Research and Application on Bloom Filter,ested via simulation. The simulation results showed that Bloom filter is useful for space savings and it is easy to implement. The results also showed that the optimal number of hash function minimizes the false prediction.作者: 公司 時(shí)間: 2025-3-23 23:05
AR RAAM: A Reliable Routing Algorithim Using Ant Agents for Manets,ransmissions. The biggest challenge in these kinds of network is to find the correct and optimal path between the communication end points, which is aggravated through the node mobility. This paper presents a comprehensive study of the impact of mobility and proposes a way to determine route stability using ant.作者: sinoatrial-node 時(shí)間: 2025-3-24 04:27
Design and Realization of Encoding Module for UHF RFID Based on FPGA,odifies and extends A, B’s content. ISO l8000-6C greatly improves the key technologies such as the physical data encoding, modulating type, anti-collision arithmetic and so on. This paper realizes data encode based on the ISO18000-6C standard and validates with FPGA.作者: 愛了嗎 時(shí)間: 2025-3-24 07:21 作者: Ceremony 時(shí)間: 2025-3-24 12:57
Parallel Implementation of A5/2 Algorithm,ck frequency nearly. As to the different high-speed methods, this paper performs detailed comparison and analysis. The design has been realized using Altera’s FPGA. Synthesis, placement and routing of this parallel design have accomplished on 0.18.m CMOS process. The result proves the critical throughput rate can achieve 1.06Gbps.作者: 十字架 時(shí)間: 2025-3-24 18:37 作者: 租約 時(shí)間: 2025-3-24 20:56 作者: 對(duì)待 時(shí)間: 2025-3-25 02:32
The Model of the Statistical Geography Information System in Grid,example is proposed and discussed its implementation process .Considering several key problems needed to be solved in the construction of the system, this paper gives its resolvents. It points out that SGIS based on grid is the best way for digital statistical information.作者: Stress-Fracture 時(shí)間: 2025-3-25 03:51
Traffic Video Based Cross Road Violation Detection and Peccant Vehicle Tracking,that the work efficiency of this method is high, and the accuracy is up to 80%; run-time of mean-shift tracking system is about 0.085s for each frame. So it has a certain practical value in the field of intelligent traffic.作者: mechanism 時(shí)間: 2025-3-25 10:50
1865-0929 by FCC Conference: agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high-performance networks and protocols, multimedia and web services, network reliability and QoS, neural net作者: 防止 時(shí)間: 2025-3-25 13:52
Mathematics Used for Expressing Waves,toring ontology is constructed based on RDF Schema step by step based on SLA monitoring requirements, ontology theory, ontology knowledge for Semantic Web. Monitoring process is build based on OWL-S benefiting for automation, coordination, and collaboration between monitoring entities.作者: deface 時(shí)間: 2025-3-25 17:04
Applications of Microwave Holography,s for Urban Heritage Inventory; another is for Urban Visual Management, and the other is for Evaluation of Historical District Renewal. Finally, a case of Hankou Historical District in Wuhan, China is applied to show the application result of the GIS database.作者: WITH 時(shí)間: 2025-3-25 22:36 作者: Desert 時(shí)間: 2025-3-26 00:48 作者: 尾隨 時(shí)間: 2025-3-26 06:23
https://doi.org/10.1007/978-3-642-02342-2Computer; FPGA; LA; Linux; Radio-Frequency Identification (RFID); Routing; algorithms; calculus; classificat作者: obligation 時(shí)間: 2025-3-26 09:39
978-3-642-02341-5Springer-Verlag Berlin Heidelberg 2009作者: armistice 時(shí)間: 2025-3-26 16:00 作者: 燒烤 時(shí)間: 2025-3-26 18:36
The Fast Fourier Transform (FFT),a. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.作者: 量被毀壞 時(shí)間: 2025-3-27 00:17 作者: 離開可分裂 時(shí)間: 2025-3-27 01:33 作者: Curmudgeon 時(shí)間: 2025-3-27 06:31 作者: Confound 時(shí)間: 2025-3-27 12:47
https://doi.org/10.1007/978-0-387-75724-7ter) used to control the line-scan camera. The paper focuses on GPS and the serial port communication as well as the control programs of single-chip microcomputer .By comparing and analyzing large amounts of experiments’ data and the serial images which are obtained in the high-speed vehicle moving 作者: 尊敬 時(shí)間: 2025-3-27 14:09 作者: 入伍儀式 時(shí)間: 2025-3-27 17:45 作者: crockery 時(shí)間: 2025-3-28 00:57
Mathematics Used for Expressing Waves,diction. Bloom filters and their generalizations, weighted Bloom filters and compressed Bloom filters have been suggested as a means for sharing web cache information. In this paper, a summary about the current research and application on Bloom filter will first be given, and then Bloom filter was t作者: 成份 時(shí)間: 2025-3-28 04:27 作者: 字謎游戲 時(shí)間: 2025-3-28 08:12
The Fast Fourier Transform (FFT),a. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.作者: insurgent 時(shí)間: 2025-3-28 12:35
https://doi.org/10.1007/BFb0120855Transport Protocol (RTP) packet to avoid unnecessary header overhead. Forward Error Correction (FEC) can be used in order to minimize the probability of packet loss in bursty loss environments such as network congestions. FEC is one of the techniques used to tackle loss problem by adding redundant d作者: 平淡而無味 時(shí)間: 2025-3-28 15:02
Optimization of electrical circuits,ws often have a high data loss rate that needs to be dealt with. Forward Error Correction (FEC) is one of the techniques used to tackle this problem by adding redundant data to the flow and helping receivers to recover missed data. Another technique used is Interleaving improves the chance of recove作者: 眼界 時(shí)間: 2025-3-28 20:59 作者: 魯莽 時(shí)間: 2025-3-29 00:21
Shape Optimization Using Boundary Elements. The static background is modeled by mixture Gaussian model, and the location of lane line is detected by Hough transformation, thus, coordinated series can be obtained from the monitor image. Information of vehicles can be obtained by background-frame binary discrete wavelet transforms (BDWT) meth作者: 憤慨一下 時(shí)間: 2025-3-29 04:49
C. Mattheck,S. Burkhardt,D. Erbt tolerance, data mining and computer security. The aim of the research introduces the mechanism of DC-T cell interaction in danger theory into the research of anomaly detection. In danger theory (a recently developed hypothesis in immunology), DCs (Dendritic Cells) within innate immune system are s作者: Inelasticity 時(shí)間: 2025-3-29 09:46
Engineering Optimization in Design Processesification technique, which widely used in many aspects such as transportation systems, military and other fields. Physical data coding module is an important part for RFID systems. ISO18000-6C provides a new air communication interface protocol of RFID systems. ISOl8000-6C is after l8000-6A, B and m作者: Cacophonous 時(shí)間: 2025-3-29 12:31
,The Engineer’s Commitment to Society,sign manages to acquire digital image data and store them into SDRAM with FPGA chips which belongs to Cyclone’s series of Altera Company, and sends them to VGA display in the end after the real-time process of image data using FPGA. This design is distinguished from traditional image acquisition sys作者: 評(píng)論性 時(shí)間: 2025-3-29 17:21
https://doi.org/10.1007/978-1-84882-674-8llel design of A5/2 algorithm is exploited in initialization, clock controlling stream generation, clock controlled stream generation and key stream generation to enhance the operating speed and the throughput rate of key stream with no increasing of complication in circuit and no decline of the clo作者: 誘拐 時(shí)間: 2025-3-29 21:46 作者: 友好 時(shí)間: 2025-3-30 02:48
RFID Middleware Design Research,a. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.作者: Embolic-Stroke 時(shí)間: 2025-3-30 05:03 作者: 大暴雨 時(shí)間: 2025-3-30 11:42
Applications of Microwave Holography,This paper introduced the working principle of Minimum shift keying(MSK) and direct digital frequency synthesizer(DDS),and realized the MSK modulator by AT89C51 and AD9862,The result show that it’s feasible to realize the digital modulation meeting the needs of phase requirement using DDS technology.作者: MILL 時(shí)間: 2025-3-30 14:57
Applications of Microwave Holography,This paper discussed the applications and implications for consumers of RFID, and focused on consumer perceptions and privacy concerns, including three fields: consumer survey results, RFID and consumer privacy, database security issues.作者: 決定性 時(shí)間: 2025-3-30 20:36 作者: relieve 時(shí)間: 2025-3-30 23:09 作者: chandel 時(shí)間: 2025-3-31 03:53
RFID Applications of Consumer Perceptions and Privacy Concerns,This paper discussed the applications and implications for consumers of RFID, and focused on consumer perceptions and privacy concerns, including three fields: consumer survey results, RFID and consumer privacy, database security issues.作者: 失誤 時(shí)間: 2025-3-31 08:33 作者: Exclude 時(shí)間: 2025-3-31 09:22
The Model of the Statistical Geography Information System in Grid,rse structure of the statistical resources make users share them and operate these systems mutually difficultly. To solve these problems, we should take into account many aspects, such as operating the database mutually, compatible operating systems and balancing the internet load and so on. While t作者: 鋼筆記下懲罰 時(shí)間: 2025-3-31 14:17 作者: 吹牛大王 時(shí)間: 2025-3-31 18:37
Emergency Command System Based on Satellite Link,nt part for it can provide a reliable technical guarantee. This paper describes a multimedia . command system based on satellite link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dis作者: 潰爛 時(shí)間: 2025-3-31 21:40 作者: countenance 時(shí)間: 2025-4-1 02:03 作者: 單調(diào)女 時(shí)間: 2025-4-1 07:07
Establishment and Application of GIS Database in Urban Heritage Conservation,blishment from literature review. Then, a series of GIS database will be designed for urban heritage conservation, which integrates three parts: one is for Urban Heritage Inventory; another is for Urban Visual Management, and the other is for Evaluation of Historical District Renewal. Finally, a cas作者: Outspoken 時(shí)間: 2025-4-1 12:30
RFID Middleware Design Research,a. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.作者: intoxicate 時(shí)間: 2025-4-1 17:18
Retracted: New Interleaving and Forward Error Correction Strategies for Streaming,Transport Protocol (RTP) packet to avoid unnecessary header overhead. Forward Error Correction (FEC) can be used in order to minimize the probability of packet loss in bursty loss environments such as network congestions. FEC is one of the techniques used to tackle loss problem by adding redundant d